首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4595篇
  免费   212篇
各国政治   135篇
工人农民   82篇
世界政治   97篇
外交国际关系   628篇
法律   715篇
中国共产党   70篇
中国政治   826篇
政治理论   308篇
综合类   1946篇
  2024年   14篇
  2023年   23篇
  2022年   40篇
  2021年   53篇
  2020年   123篇
  2019年   73篇
  2018年   99篇
  2017年   144篇
  2016年   114篇
  2015年   124篇
  2014年   325篇
  2013年   424篇
  2012年   263篇
  2011年   261篇
  2010年   270篇
  2009年   339篇
  2008年   328篇
  2007年   340篇
  2006年   301篇
  2005年   289篇
  2004年   295篇
  2003年   222篇
  2002年   150篇
  2001年   146篇
  2000年   34篇
  1999年   9篇
  1998年   2篇
  1997年   1篇
  1995年   1篇
排序方式: 共有4807条查询结果,搜索用时 15 毫秒
801.
中日关系经济上的合作依存度与政治上的纷争摩擦常态化这一结构性的矛盾日趋显现.从更深层次上探究中日政治经济所处的这种分裂状态根源,从本质上讲背后蕴涵着东北亚大国关系中的域外因素:即美国的第三方因素,其对东北亚的和平稳定发挥着特殊作用.东北亚大国在地区的竞争摩擦时常较为突出,但中美日在东亚地区还是蕴涵着许多重大的共同利益.东北亚传统的"管制型"安全模式需向大国共同"治理型"模式转变趋向,意味着大国区域安全治理的权利、利益、责任的平等与分享,地区安全治理是在大国协作框架下的共同治理,应注重大国在地区安全事务中的关键作用.  相似文献   
802.
新世纪以来,中朝经贸关系保持快速发展态势。其中的重要转变是从过去以战略安全为主导的经贸关系逐步转向以市场为主导的经贸关系,这一转变预示朝鲜正处于向市场经济转型的初始阶段。而在中朝经贸关系持续发展过程中,中国和朝鲜各自存在的问题影响、甚至阻碍着双边经贸关系的进一步发展,为了超越障碍、抓住朝鲜亟须外部支持之时机,中国有必要从重新确定双边经贸关系战略地位等方面入手,积极推动中朝经贸关系深入发展。  相似文献   
803.
中国与东盟的能源安全合作已从现实和制度层面展开,但是仍然存在能源产品出口受到限制、能源运输通道安全受到威胁、南海问题向国际化方向发展等问题,应当注重国际法规范在保障中国与东盟能源安全合作中的作用,利用联合国条约体系、WTO协议和CAFTA协议,充分认识ECT和NAFTA协定的借鉴意义。  相似文献   
804.
This article argues that Australia's recently-passed data breach notification legislation, the Privacy Amendment (Notifiable Data Breaches) Act 2017 (Cth), and its coming into force in 2018, makes an internationally important, yet imperfect, contribution to data breach notification law. Against the backdrop of data breach legislation in the United States and European Union, a comparative analysis is undertaken between these jurisdictions and the Australian scheme to elucidate this argument. Firstly, some context to data breach notification provisions is offered, which are designed to address some of the problems data breaches cause for data privacy and information security. There have been various prominent data breaches affecting Australians over the last few years, which have led to discussion of what can be done to deal with their negative effects. The international context of data breach notification legislation will be discussed, with a focus on the United States and European Union jurisdictions, which have already adopted similar laws. The background to the adoption of the Australia legislation will be examined, including the general context of data privacy and security protection in Australia. The reform itself will be then be considered, along with the extent to which this law is fit for purpose and some outstanding concerns about its application. While data breach notification requirements are likely to be a positive step for data security, further reform is probably necessary to ensure strong cybersecurity. However, such reform should be cognisant of the international trends towards the adoption of data security measures including data breach notification, but lack of alignment in standards, which may be burdensome for entities operating in the transnational data economy.  相似文献   
805.
Robust cyber-resilience depends on sound technical controls and testing of those controls in combination with rigorous cyber-security policies and practices. Increasingly, corporations and other organizations are seeking to test all of these, using methods more sophisticated than mere network penetration testing or other technical audit operations. More sophisticated organizations are also conducting so-called “Red Team” exercises, in which the organization tasks a small team of highly skilled and trained individuals to try to gain unauthorized access to physical and logical company assets and information. While such operations can have real value, they must be planned and conducted with great care in order to avoid violating the law or creating undue risk and reputational harm to the organization. This article explores these sometimes tricky issues, and offers practical risk-based guidance for organizations contemplating these types of exercises.  相似文献   
806.
With a focus on India, and drawing on critical scholarship on geo-politics and geo-economics and “relational” state theories, this article examines the ways in which ideational and material processes of state transformation have shaped India’s international engagement in different periods. Prior to 1991, geo-political social forms linked to a national developmentalist state project shaped India’s engagement with global and regional multilateralism and the nature of this engagement fluctuated according to shifts in the legitimacy and viability of this state project. The erosion of the developmentalist state project from the 1970s laid the path for a deeper shift in the national social order in the 1990s with the recasting of statehood wherein India’s future was thought to be best secured through policies of economic openness, growth and competitiveness. This shift in India’s state project has given rise to new forms of global and regional engagement that are distinct to older forms of international engagement and reflect and further processes of state transformation in India. This is illustrated through a case study on energy policy.  相似文献   
807.
A human rights approach to food security seeks to empower vulnerable groups to claim their rights. It also reinforces a government’s obligations to respect, protect and fulfil the right to food. Furthermore, it encourages the integration of the right to food into the design and implementation of food security policies. This article examines the human rights approach to food security, with specific reference to Ethiopia. It assesses the historical causes of Ethiopia’s food insecurity, and examines the legislative and policy measures that the country has adopted over the last three decades in order to achieve food security. Food insecurity in the country is largely explained by the absence of government accountability. In 1973 and 1984, the hunger caused by drought was transitioned to famine not because of overall unavailability of food in the country, but because the government failed to provide food aid to the starved people and concealed the occurrence of famines from the international donors. Despite designing some food security policies over the last three decades, the country has not yet adopted sufficient legislative and judicial measures to enforce the right to food. This article argues that Ethiopia should introduce a framework law on the right to food to end hunger in the context of achieving national food security.  相似文献   
808.
Abstract

The aim of this article is to explain the internal conditions of military security in a non-European context. It utilises securitisation as the theoretical perspective and investigates Iranian and Indonesian case studies to explore how the perception of internal threats and vulnerabilities determines the approaches to military security. It begins with a reiteration of securitisation theory assumptions, followed by clarifying the understanding of security in non-Western contexts. The case studies focus on the conditions which facilitate securitisation, including the nature of securitising actors, assumed concepts of security, and securitisation processes and their outcomes. The analysis indicates a necessity for several alterations in securitisation theory to realise its full potential. Civil–military relations in Asian states differ from those in the West, as both Iran and Indonesia show a high degree of military involvement in political affairs. Military security also becomes securitised as a result of internal political rivalries. The perception of threats is a tool in the struggle to extend the capabilities of security agencies or retain influences.  相似文献   
809.
This article examines the impact of structural reforms and industrial relations changes on the employment security and decision behaviors of middle-level managers in the Australian Taxation Office (ATO). This article is based on an empirical study using focus group and survey data that investigated how structural change and public-sector reforms substantially altered the employment environment. This research reveals that the ATO environment can be characterized by low morale, risk aversion, fear, and distrust brought about, in part, by employment insecurity. Where middle managers perceived organizational threats to their employment security, they engaged in self-protective “survivor” behaviors even when no such threats to their employment security existed. The article concludes that a substantial number of middle-level managers, survivors of years of restructuring, downsizing, and organizational change, were unlikely to display high-quality decision-making behaviors.  相似文献   
810.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号